Abstract
P2P networks play a promotive role in distribution and transmission of digital multimedia content by providing high availability, fault tolerance, bandwidth efficiency and dynamic scalability. At the same time, however, it facilitates illegal pirate and unauthorized access towards copyright media content which may violate possessor ownership and result in economic loss. Conventional client/server model for DRM has difficulties coping with the challenge of secure communication in P2P environment. In this paper, we propose a strategy to incorporate DRM mechanism into P2P network architecture and construct a system which ensures efficient content sharing as well as reliable media protection. Our approach implements a revocable key management scheme based on broadcast encryption and enables cryptographic information for session key processing to be distributed among users within the same authorized domain in peer-to-peer mode. Mathematical analysis has demonstrated that the new strategy outperforms traditional solutions on alleviating communication overhead of License Server, minishing peer latency of authorization, and importing security modules without much modification to original peer-to-peer infrastructure.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Subramanya, S.R., Yi, B.K.: Digital Rights Management. IEEE Potentials 25(2), 31–34 (2006)
Kumar, V.: Trust and Security in Peer-to-Peer System. In: Proceedings of the 17th Inter-national Conference on Database and Expert Systems Applications, pp. 703–707 (2006)
Yu, F., Zhang, H., Yan, F.: A Fuzzy Relation Trust Model in P2P System. In: International Conference on Computation Intelligence and Security, vol. 2, pp. 1497–1502 (2006)
Griffiths, N., Chao, K.-M., Younas, M.: Fuzzy Trust for Peer-to-Peer Systems. In: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems Workshops, pp. 73–78 (2006)
Song, S., Hwang, K., Zhou, R., Kwok, Y.-K.: Trusted P2P Transactions with Fuzzy Reputation Aggregation. IEEE Internet Computing 9(6), 24–34 (2005)
Singh, A., Liu, L.: TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. In: Proceedings of the Third International Conference on Peer-to-Peer Computing, pp. 142–149 (2003)
Xiao, L., Xu, Z., Zhang, X.: Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems 14(9), 829–840 (2003)
Nandan, A., Pau, G., Salomoni, P.: GhostShare – Reliable and Anonymous P2P Video Distribution. In: IEEE Global Telecommunications Conference Workshops, pp. 200–210 (2004)
Mee, J., Watters, P.A.: Detecting and Tracing Copyright Infringements in P2P Net-works. In: Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, pp. 60–65 (2006)
Chen, K., Deng, Q.: Legitimate Peer-to-Peer Content Distribution Network. In: Proceedings of the Fifth International Conference on Grid and Cooperative Computing Workshops (2006)
Schmucker, M., Ebinger, P.: Promotional and Commercial Content Distribution based on a Legal and Trusted P2P Framework. In: Proceedings of the Seventh IEEE International Conference on E-Commerce Technology, pp. 439–442 (2005)
Chu, C.-C., Su, X., Prabhu, B.S., Gadh, R., Kurup, S., Sridhar, G., Sridhar, V.: Mobile DRM for Multimedia Content Commerce in P2P Networks. In: 2006 3rd IEEE Consumer Communi-cations and Networking Conference, vol. 2, pp. 1119–1123 (January 2006)
Neelima Arora, R.K., Shyamasundar, R.K.: PGSP: A Protocol for Secure Communication in Peer-to-Peer System. In: IEEE Wireless Communications and Networking Conference, vol. 4, pp. 2094–2099 (2005)
Pathak, V., Iftode, L.: Byzantine Fault Tolerant Public Key Authentication in Peer-to-Peer Systems. Computer Networks. Special Issues on Management in Peer-to-Peer Systems: Trust, Reputation and Security 50(4), 579–596 (2006)
Palomar, E., Estevez-Tapiador, J.M., Hernandez-Castro, J.C., Ribagorda, A.: Certificate-based Access Control in Pure P2P Networks. In: Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing, pp. 177–184 (2006)
Pestoni, F., Lotspiech, J.B., Nusser, S.: xCP: Peer-to-Peer Content Protection. IEEE Signal Processing Magazine 21(2), 71–81 (2004)
Zhou, Y.C., Cerruti, J.A., Ma, L., Ma, L., Myles, G.: CPWCT: Making P2P Home Network Secure Virtual Multimedia Device. In: Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary (2005)
Fiat, A., Naor, M.: Broadcast Encryption. In: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, pp. 480–491 (August 1994)
Lotspiech, J., Nusser, S., Pestoni, F.: Broadcast Encryption’s Bright Future. Computer 35(8), 57–63 (2002)
Boneh, D., Gentry, C., Waters, B.: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, Y., Yuan, C., Zhong, Y. (2007). Implementing DRM over Peer-to-Peer Networks with Broadcast Encryption. In: Ip, H.HS., Au, O.C., Leung, H., Sun, MT., Ma, WY., Hu, SM. (eds) Advances in Multimedia Information Processing – PCM 2007. PCM 2007. Lecture Notes in Computer Science, vol 4810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77255-2_26
Download citation
DOI: https://doi.org/10.1007/978-3-540-77255-2_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77254-5
Online ISBN: 978-3-540-77255-2
eBook Packages: Computer ScienceComputer Science (R0)